SlideShare a Scribd company logo
1 of 4
Download to read offline
IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 9, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 1737
A Review Paper on Network Layer attacks in MANETs
Dhruvi Marsonia1
Prof. Hardik Patel2
1
P. G. Student (I. T.) 2
Assistant Professor
1
Shantilal Shah Engineering College, Bhavnagar, Gujarat
2
Sir Bhavsinhji Polytechnic Institute, Bhavnagar, Gujarat
Abstract—The security issues are the major consideration
while implementing Mobile Ad hoc Networks (MANETs).
Misbehavior of any node can do serious implications in this
kind of dynamic network. A malicious or selfish node wants
to preserve own resources along with using the services of
other nodes and consumed their resources. Malicious nodes
can break the rules and reduce the performance of well-
behaved nodes significantly. This paper describes the
different attacks and analysis of within Network Layer in
MANETs.
Key words: MANETs, Ad Hoc, Security, Robust, Malicious
nodes, selfish node etc.
I. INTRODUCTION TO MANETS
The MANET is the collection of mobile users that
communicate over relatively bandwidth constrained wireless
links. Since the nodes are mobile, the network topology may
change speedily and random over time. It is also known as
infrastructure less network. MANETs can form stand-alone
groups of wireless terminals, but some of these may be
connected to some fixed network. Compared to wireless
networks in infrastructure mode ad-hoc networking doesn't
require any access points. This makes useful in lots of
different applications. It is largely used in military
applications and in rescue operations where the existing
communication infrastructure has been destroyed is possible
for two nodes which are not in the communication range of
each other, but still can send and receive data from each
other with the help of intermediate nodes which can act as
routers. This functionality gives another name to ad hoc
network as “multi-hop wireless network”. There are
different routing attacks which appear in network layer
during wireless transmission of messages. These attacks are
caused by either some internal or external intruders. To
accomplish our goal, we have done some methods to
gathering information related to various types of attacks and
solutions. In this paper we have study different attacks in
network layer and also some security issue in mobile ad-hoc
network.
II. VULNERABILITY OF MANETS
In a network Vulnerability of Manets is a weakness in
security system. A particular system may be vulnerable to
unauthorized data manipulation because the system does not
verify a user’s identity before allowing data access. MANET
is weaker than wired network. Some of the vulnerabilities
are as follows:
Lack of centralized management:A.
MANET doesn’t have a centralized monitor server. The
absence of centralized management makes the detection of
attacks difficult because it is not east to monitor the traffic in
a highly dynamic and large scale ad-hoc network. Lack of
centralized management will impede trust management for
nodes [1].
Dynamic Topology:B.
In MANETs, nodes can join and leave the network
dynamically and can move independently. Due to such type
nature there is no fixed set of topology works in MANETs.
The nodes with poor physical protection may become
malicious node and reduce the network performance [2].
Resource availability:C.
Resource availability is a major issue in MANET. Providing
secure communication in such changing environment as
well as protection against specific threats and attacks, leads
to development of various security schemes and
architectures. Collaborative ad-hoc environments also allow
implementation of self-organized security mechanism [1].
Limited resources:D.
The MANETs consists of different set of devices such as
laptops, computers, mobile phones etc. All of such devices
having different storage capacity, processing speed,
computational power etc. This may attracts the attackers to
focus on new attacks [2].
Scalability:E.
Due to flexibility of nodes, scale of ad-hoc network
changing all the time. So scalability is a major issue about
security. Security mechanism should be capable of handling
a large network as well as small ones [1].
Cooperativeness:F.
Routing algorithm for MANETs usually assume that nodes
are cooperative and not a malicious. As a result a malicious
attacker can easily become an important routing agent and
interrupt network operation by violating the protocol
specifications [1].
Limited power supply:G.
The nodes in mobile ad-hoc network need to consider
restricted power supply, which will cause several problems.
A node in mobile ad-hoc network may behave in a selfish
manner when it is finding that there is only limited power
supply [1].
Wireless Links:H.
As the nodes in such networks are interconnected through
wireless interface that makes it highly susceptible to link
attacks. The bandwidths of wireless networks are less as
compared to wired networks, which attracts many attackers
to prevent normal communication among nodes [2].
A Review Paper on Network Layer attacks in MANETs
(IJSRD/Vol. 1/Issue 9/2013/0011)
All rights reserved by www.ijsrd.com 1738
III. SECURITY ATTACKS
Securing wireless ad-hoc networks is a highly challenging
issue. Understanding possible form of attacks is always the
first step towards developing good security solutions.
Security of communication in MANET is important for
secure transmission of information [9]. Absence of any
central co-ordination mechanism and shared wireless
medium makes MANET more vulnerable to digital/cyber-
attacks than wired network there are a number of attacks
that affect MANET. These attacks can be classified into two
types.
Types
of
Attack
Characteristics Example
Passive
Attacks
Obtains information without
disturbing normal network
operation
• Difficult to detect
Traffic analysis,
traffic
monitoring and
eavesdropping
Active
Attacks
Can be internal (attacker
within the network) or
external (attacker outside the
network)
•Can disturb network
operation by modifying or
deleting information,
injecting a false message or
impersonating a node
Modification,
Impersonation,
jamming and
message replay
Table. 1: Attack Classification
Passive attacksA.
Passive attacks are the attack that does not disrupt proper
operation of network .Attackers watch data exchanged in
network without altering it. Detection of passive attacks is
difficult since the operation of network itself does not get
affected. Different type of passive attack as follow:
1) Release of Message Content
Release of Message Content is like an Eavesdropping.
Secretly listening to the private conversation of others
without their consent
2) Traffic Analysis
Traffic analysis is Monitoring or observes a situation for any
changes which may occur over time.
Active attacksB.
Active attacks that are performed by the malicious nodes
that bear some energy cost in order to perform the attacks.
Active attacks include some modification of data stream or
creation of false stream. Active attacks, whether carried out
by an external advisory or an internal compromised node
involves actions such as impersonation (masquerading or
spoofing), modification, fabrication and replication.
Different types of Active attacks are as follow:
1) Masquerade
Masquerade is Pretend to be someone one is not. For
example bob does not send a message to Alice. But Darth
send a message to Alice as that appears by the bob.
2) Replay
Reply is Pretend to Playing again. For Example Bob send a
message to Alice but that message capture by Darth and
latter reply message to Alice.
3) Modification of Messages
Modification of messages is to Alteration in original
message. Some Modification in message as like some data
insertion, deletion, modification etc. Message is altered,
deployed to produce an unauthorized effect.
4) Denial of Service
Denial of service is an attempt to make a resource
unavailable to its intended users.
Some of the Dos Attacks are also listed below.
IV. NETWORK LAYER ATTACKS
Layer Example Of Attacks
Network Layer
DoS attacks: Wormhole, Black hole,
Gray hole, Byzantine, Resource
Consumption attack, Rushing attack
Information Disclosure
selfishness Attack: selfish node
.malicious node
Table. 2: Network Layer Attacks.
Network Layer AttacksA.
1) Wormhole Attack:
In this attack two compromised nodes create a tunnel or
wormhole hole that linked through a private connection and
thus they by-pass the network. This allows the node to short-
circuit the normal flow of routing that control by the two
attackers [5].The Wormhole attack is a kind of tunneling
attack which is extremely dangerous and damaging to
defend against even though the routing information is
confidential, authenticated or encrypted [4]. It is relatively
easy to deploy but exceedingly hard to detect. Usually
Wormhole attack is launched by two malicious nodes
(worms) connected via a high-speed wired or wireless link
called Wormhole link or tunnel. Nodes outside each other’s
communication range have to communicate via intermediate
nodes in a multi-hop way. [4]. The worms can drop
delivered messages and acquire statistical data of traffic by
investigating message traffic [10]. To minimize delay, the
attacker may forward each bit through the Wormhole link
without waiting for the entire packet to be received [4].
 Operation of Wormhole Attack:
As shown in Figure 1, two malicious nodes X and Y created
the Wormhole attack on the MANET. X and Y are
connected via a high-speed Wormhole link that tunnels
traffic between nodes A and B. when node A want to
communicate with node B, normally it takes multiple hops
for a packet to travel between them. Though in the
attendance of worms X and Y, A and B start believing that
they are immediate neighbors. Packets traveling through
Wormhole link travel faster to the destination than packets
traveling through multiple hops in the MANET. X and Y do
not alter the packet header and falsify the route lengths.
Packets received by X are replayed through Wormhole link
to Y and vice versa. X and Y can now selectively drop data
packets or analyze traffic and disrupt the network’s
communication. Malicious nodes X and Y along with the
Wormhole link are not visible in the route; and also the
Wormhole attacker is hidden from the higher layers.
Therefore, detection of Wormhole attack is exceedingly
tough.
A Review Paper on Network Layer attacks in MANETs
(IJSRD/Vol. 1/Issue 9/2013/0011)
All rights reserved by www.ijsrd.com 1739
Fig. 1: wormhole Attack
2) Packet Dropping or Black-hole Attack:
Blackhole attack is another type of DoS attack. In mobile ad
hoc networks (MANETs), nodes usually cooperate and
forward each other’s packets in order to enable out of range
communication. Saving their own resources or for
intentionally disrupting regular communications. This type
of misbehavior is generally referred to as packet dropping
attack or black hole attack [6].That generates and
disseminates fabricated routing information. If the malicious
node replies to the requesting node before the actual node
replies, a bogus route will be created. Therefore packets are
not forwarded to the specified destination node; instead, the
malicious node intercepts the packets, drops them and thus,
absorbs network traffic [4].
 Operation of Blackhole Attack:
An example of Blackhole attack against AODV protocol
(Ad-hoc On demand Distance Vector) is shown in Figure 2.
[4]. Suppose source S wants to communicate with node D. S
initiates route discovery process by broadcasting route
request packets (RREQ) to its neighbors. The destination
node D or any intermediate nodes having fresh route to the
destination can give reply by sending reply packet (RREP)
to S. Considering no intermediate nodes have a fresh route
to D, they forward request packets towards destination. As
X is a malicious node, it doesn’t forward the request packet
ahead; instead, it falsely replies to S indicating that it has a
valid fresh route to D. Thus, reply packet from X reaches to
S ahead of reply packets from other neighbors of S.
Therefore, S considers sending packets to D via X
considering that X has a shortest route to D. Now X absorbs
all packets forwarded from S to D. This is how a Blackhole
attack is setup.
Fig. 2: Blackhole attack
3) Gray-hole attack:
This attack is also known as routing misbehaviour attack
which leads to dropping of messages. Gray hole attack has
two phases. In the first phase the node advertise itself as
having a valid route to destination while in second phase,
nodes drops intercepted packets with a certain
probability[1].Grayhole attack is an extension of Blackhole
attack in which a malicious node’s behavior is exceptionally
unpredictable[4].
4) Resource Consumption Attack:
In this attack, a malicious node intentionally tries to
consume the resources (e.g. battery power, bandwidth etc)
of other nodes in the network. The attack can be of various
types like unnecessary route requests, route discovery,
control messages, or by sending stale information [6].
5) Selfishness Attack:
Cooperation among nodes in Ad- Hoc Networks is an
important issue for communication. But some nodes do not
cooperate in communication and saves their energy. These
nodes are called Selfish nodes. Selfish nodes participate in
route discovery stage properly to update their routing table,
but as soon as data forwarding stage begins, they drop data
packets This malicious node which is not participating in
network operations, use the network for its advantage to
save its own resources such as power [6, 1].
a) Selfish Misbehavior of Nodes
Attacks under this category, are directly affects the self-
performance of nodes and does not interfere with the
operation of the network [2]. It may include two important
factors.
i) Protection of battery power
ii) Gaining partial share of bandwidth: The selfish nodes
may reject to take part in the forwarding process or drops
the packets purposefully in order to conserve the
resources. These attacks use the routing protocol to their
own advantage. Packet dropping is one of the main
attacks by selfish node which indications to congestion
in network. However most of routing protocols have no
mechanism to detect whether the packets being
forwarded or not except DSR (dynamic source routing)
[2].
b) Behavior of Malicious nodes
The main of malicious node is to disrupt normal operation
of routing protocol. The impact of such attack is increased
when the communication takes place between neighboring
nodes. Attacks of such type are fall into following
categories.
i) Denial of Service (DOS): These types of attacks
produced a malicious action with the help of
compromised nodes that forms severe security risks. In
the presence of compromised nodes, it is very difficult to
detect the compromised routing. The compromised route
appears like a normal route but leads to severe problems.
For example, a compromised node could participate in
the communication but drops some packets which lead to
degradation in the quality of service being offered by
network [2].
ii) Attacks on Network integrity: Network integrity is an
important issue, in order to provide secure
communication and quality of service in network. There
are so many threats which exploit the routing protocol to
introduce wrong routing information [2].
iii) Misdirecting traffic: A malicious node advertises wrong
routing information in order to get secure data before the
A Review Paper on Network Layer attacks in MANETs
(IJSRD/Vol. 1/Issue 9/2013/0011)
All rights reserved by www.ijsrd.com 1740
actual route. These nodes receive information that was
intended for owner of the address. A malicious node may
advertise fake route request, so that other nodes will then
direct route replies to the node [2].
iv) Attacking neighbor sensing protocols: malicious nodes
advertise fake error messages so that important links
interface are marked as broken. This will result in
decrease in network throughput and quality of service
[2].
 Operation of malicious nodes
In such attacks, the attackers can create routing loops to
form severe congestion. Different type of attacks are
identified which are initiated by malicious node. The
malicious node “X” can absorb important data by placing
itself between source “A” and destination “D” as shown in
Figure-3. “X” can also divert the data packets exchanged
between “A” and “D”, which results in significant end to
end delay between “A” and “D”. In this type of attacks
attackers attacks against Routing and Path Selection The
malicious node can disrupt the route discovery process by
creating routing loops and overflow routing tables [2].
Fig. 3: Malicious nodes
V. CONCLUSION AND FUTURE WORK
Due to dynamic structure of MANETs and having no
centralized administration, it makes it more vulnerable to
many attacks. It is discussed, the weakness MANETs as
well as various active and passive attacks. (There is no
significant contribution has been shown in work means what
is your finding and what are the solutions)
In future study we will try to invent such intrusion
detection system with routing protocols that helps to reduce
the impact of different attacks.
REFERENCES
[1] A Literature Review of Security Attack in Mobile Ad-
hoc Networks Priyank Goyal, Bhiwani, Haryana, Sahil
Batra ,International journal of computer application
(0975-8887) volume-9 No 12,November 2010.
[2] Analysis of Different Security Attacks in MANETs on
Protocol Stack A Review Gagandeep, Aashima, Pawan
Kumar, International Journal o Engineering and
Advanced Technology (IJEAT) ISSN: 2249 – 8958,
Volume-1, Issue-5, June 2012.
[3] Review Report ATTACK Analysis in Mobile Ad HOC
Network Based on System Observations Nidhi
Saxena1, Iyagpal Yadav, Vipul Saxena International
Journal of Advanced Research in Computer Science a
Software Engineering 3(7), July – 2013, pp. 618-623.
[4] DoS Attacks in Mobile Ad-hoc Networks: A Survey”,
Rutvij H. Jhaveri, Sankita J. Patel and Devesh C.
Jinwala,” 2012 Second International Conference on
Advanced Computing & Communication Technologies,
IEEE.
[5] Detecting unauthorized and compromised node in
mobile ad-hoc network, Nikoskomniuos.
[6] Selfish Node Detection with modified AODV in Ad-
Hoc Networks Niyati Shah , Sharada Valiveti , Dr. K
Kotecha Institute of Technology Nirma University
Ahmedabad, Gujarat, India.
[7] Advanced Detection of Selfish or Malicious Nodes in
Ad hoc Networks Frank Kargl, Andreas Klenk, Stefan
Schlott, and Michael Weber.
[8] P. D. PrzemyslawKazienko, “Intrusion detection
systems (ids) part i - (network intrusions; attack
symptoms; ids tasks; and ids architecture),” Apr, 2003.
[9] Z. Karakehayov, “Using REWARD to Detect Team
Black- Hole Attacks in Wireless Sensor Networks,”
Wksp. Real-World Wireless Sensor Networks, June 20–
21, 2005.
[10]MahdiTaheri, Dr. majidnaderi, Mohammad Bagher
Barekatain, “New Approach for Detection and
defending the Wormhole Attacks in Wireless Ad Hoc
Networks”, 18th Iranian Conference on Electrical
Engineering,, May 2010, pp. 331-335.

More Related Content

What's hot

Security in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniquesSecurity in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniquesIAEME Publication
 
Ijartes v1-i2-007
Ijartes v1-i2-007Ijartes v1-i2-007
Ijartes v1-i2-007IJARTES
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Sunilkumar2017
Sunilkumar2017Sunilkumar2017
Sunilkumar2017Sharonp15
 
Jaringan Adhoc
Jaringan AdhocJaringan Adhoc
Jaringan Adhoccorcrash
 
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADE
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADEMitigation of Colluding Selective Forwarding Attack in WMNs using FADE
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADEIJTET Journal
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNijcncs
 
A comparative study of black hole attack in manet 2
A comparative study of black hole attack in manet 2A comparative study of black hole attack in manet 2
A comparative study of black hole attack in manet 2IAEME Publication
 
HANDLING CROSS-LAYER ATTACKS USING NEIGHBORS MONITORING SCHEME AND SWARM INTE...
HANDLING CROSS-LAYER ATTACKS USING NEIGHBORS MONITORING SCHEME AND SWARM INTE...HANDLING CROSS-LAYER ATTACKS USING NEIGHBORS MONITORING SCHEME AND SWARM INTE...
HANDLING CROSS-LAYER ATTACKS USING NEIGHBORS MONITORING SCHEME AND SWARM INTE...Editor IJCATR
 
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
 
Paper id 71201996
Paper id 71201996Paper id 71201996
Paper id 71201996IJRAT
 
Ensuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic NetworkEnsuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic NetworkIOSR Journals
 
A Survey of Key Management Framework for Wireless Mobile Environment
A Survey of Key Management Framework for Wireless Mobile EnvironmentA Survey of Key Management Framework for Wireless Mobile Environment
A Survey of Key Management Framework for Wireless Mobile EnvironmentAM Publications,India
 
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
 

What's hot (18)

1705 1708
1705 17081705 1708
1705 1708
 
Security in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniquesSecurity in manet via different intrusion detection techniques
Security in manet via different intrusion detection techniques
 
Ijartes v1-i2-007
Ijartes v1-i2-007Ijartes v1-i2-007
Ijartes v1-i2-007
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Sunilkumar2017
Sunilkumar2017Sunilkumar2017
Sunilkumar2017
 
Jaringan Adhoc
Jaringan AdhocJaringan Adhoc
Jaringan Adhoc
 
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADE
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADEMitigation of Colluding Selective Forwarding Attack in WMNs using FADE
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADE
 
JCC_2015120915212763
JCC_2015120915212763JCC_2015120915212763
JCC_2015120915212763
 
DOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSNDOS Attacks on TCP/IP Layers in WSN
DOS Attacks on TCP/IP Layers in WSN
 
D43021519
D43021519D43021519
D43021519
 
A comparative study of black hole attack in manet 2
A comparative study of black hole attack in manet 2A comparative study of black hole attack in manet 2
A comparative study of black hole attack in manet 2
 
HANDLING CROSS-LAYER ATTACKS USING NEIGHBORS MONITORING SCHEME AND SWARM INTE...
HANDLING CROSS-LAYER ATTACKS USING NEIGHBORS MONITORING SCHEME AND SWARM INTE...HANDLING CROSS-LAYER ATTACKS USING NEIGHBORS MONITORING SCHEME AND SWARM INTE...
HANDLING CROSS-LAYER ATTACKS USING NEIGHBORS MONITORING SCHEME AND SWARM INTE...
 
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
 
Paper id 71201996
Paper id 71201996Paper id 71201996
Paper id 71201996
 
Ensuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic NetworkEnsuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic Network
 
A Survey of Key Management Framework for Wireless Mobile Environment
A Survey of Key Management Framework for Wireless Mobile EnvironmentA Survey of Key Management Framework for Wireless Mobile Environment
A Survey of Key Management Framework for Wireless Mobile Environment
 
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
 
Gw2412271231
Gw2412271231Gw2412271231
Gw2412271231
 

Similar to A Review Paper on Network Layer attacks in MANETs

Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANETSunita Sahu
 
Injection of Attacks in MANETs
Injection of Attacks in MANETsInjection of Attacks in MANETs
Injection of Attacks in MANETsIOSR Journals
 
Sunilkumar2017
Sunilkumar2017Sunilkumar2017
Sunilkumar2017Sharonp15
 
Protecting Global Records Sharing with Identity Based Access Control List
Protecting Global Records Sharing with Identity Based Access Control ListProtecting Global Records Sharing with Identity Based Access Control List
Protecting Global Records Sharing with Identity Based Access Control ListEditor IJCATR
 
Different Types of Attacks and Detection Techniques in Mobile Ad Hoc Network
Different Types of Attacks and Detection Techniques in Mobile Ad Hoc NetworkDifferent Types of Attacks and Detection Techniques in Mobile Ad Hoc Network
Different Types of Attacks and Detection Techniques in Mobile Ad Hoc NetworkEditor IJCATR
 
Manet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication PlatformManet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication Platformpijans
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
 
IRJET- Analysis of Router Poisoning using Network Attacks
IRJET- Analysis of Router Poisoning using Network AttacksIRJET- Analysis of Router Poisoning using Network Attacks
IRJET- Analysis of Router Poisoning using Network AttacksIRJET Journal
 
EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANET
EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANETEFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANET
EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANETIJNSA Journal
 
Attacks and counterattacks on wireless sensor networks
Attacks and counterattacks on wireless sensor networksAttacks and counterattacks on wireless sensor networks
Attacks and counterattacks on wireless sensor networksijasuc
 
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSNREPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSNIJNSA Journal
 
SECURITY CHALLENGES AS A FACTOR AFFECTING THE SECURITY OF MANET: ATTACKS, AND...
SECURITY CHALLENGES AS A FACTOR AFFECTING THE SECURITY OF MANET: ATTACKS, AND...SECURITY CHALLENGES AS A FACTOR AFFECTING THE SECURITY OF MANET: ATTACKS, AND...
SECURITY CHALLENGES AS A FACTOR AFFECTING THE SECURITY OF MANET: ATTACKS, AND...IJNSA Journal
 
Security challengesasa factor affectingthe
Security challengesasa factor affectingtheSecurity challengesasa factor affectingthe
Security challengesasa factor affectingtheIJNSA Journal
 
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKPERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKIJCNCJournal
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networksPiyush Mittal
 

Similar to A Review Paper on Network Layer attacks in MANETs (20)

Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
Abdullah Mukhtar ppt
Abdullah Mukhtar pptAbdullah Mukhtar ppt
Abdullah Mukhtar ppt
 
Injection of Attacks in MANETs
Injection of Attacks in MANETsInjection of Attacks in MANETs
Injection of Attacks in MANETs
 
Sunilkumar2017
Sunilkumar2017Sunilkumar2017
Sunilkumar2017
 
1705 1708
1705 17081705 1708
1705 1708
 
Protecting Global Records Sharing with Identity Based Access Control List
Protecting Global Records Sharing with Identity Based Access Control ListProtecting Global Records Sharing with Identity Based Access Control List
Protecting Global Records Sharing with Identity Based Access Control List
 
Different Types of Attacks and Detection Techniques in Mobile Ad Hoc Network
Different Types of Attacks and Detection Techniques in Mobile Ad Hoc NetworkDifferent Types of Attacks and Detection Techniques in Mobile Ad Hoc Network
Different Types of Attacks and Detection Techniques in Mobile Ad Hoc Network
 
Manet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication PlatformManet Security Breaches : Threat to A Secure Communication Platform
Manet Security Breaches : Threat to A Secure Communication Platform
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
 
Ls3620132016
Ls3620132016Ls3620132016
Ls3620132016
 
IRJET- Analysis of Router Poisoning using Network Attacks
IRJET- Analysis of Router Poisoning using Network AttacksIRJET- Analysis of Router Poisoning using Network Attacks
IRJET- Analysis of Router Poisoning using Network Attacks
 
EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANET
EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANETEFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANET
EFFICIENT DETECTION OF SYBIL ATTACK BASED ON CRYPTOGRAPHY IN VANET
 
Attacks and counterattacks on wireless sensor networks
Attacks and counterattacks on wireless sensor networksAttacks and counterattacks on wireless sensor networks
Attacks and counterattacks on wireless sensor networks
 
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSNREPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
REPLICATION ATTACK MITIGATIONS FOR STATIC AND MOBILE WSN
 
Dj4301653656
Dj4301653656Dj4301653656
Dj4301653656
 
SECURITY CHALLENGES AS A FACTOR AFFECTING THE SECURITY OF MANET: ATTACKS, AND...
SECURITY CHALLENGES AS A FACTOR AFFECTING THE SECURITY OF MANET: ATTACKS, AND...SECURITY CHALLENGES AS A FACTOR AFFECTING THE SECURITY OF MANET: ATTACKS, AND...
SECURITY CHALLENGES AS A FACTOR AFFECTING THE SECURITY OF MANET: ATTACKS, AND...
 
Security challengesasa factor affectingthe
Security challengesasa factor affectingtheSecurity challengesasa factor affectingthe
Security challengesasa factor affectingthe
 
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKPERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
 

More from ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Gridijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation Systemijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigeratorijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparatorsijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

A Review Paper on Network Layer attacks in MANETs

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 9, 2013 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 1737 A Review Paper on Network Layer attacks in MANETs Dhruvi Marsonia1 Prof. Hardik Patel2 1 P. G. Student (I. T.) 2 Assistant Professor 1 Shantilal Shah Engineering College, Bhavnagar, Gujarat 2 Sir Bhavsinhji Polytechnic Institute, Bhavnagar, Gujarat Abstract—The security issues are the major consideration while implementing Mobile Ad hoc Networks (MANETs). Misbehavior of any node can do serious implications in this kind of dynamic network. A malicious or selfish node wants to preserve own resources along with using the services of other nodes and consumed their resources. Malicious nodes can break the rules and reduce the performance of well- behaved nodes significantly. This paper describes the different attacks and analysis of within Network Layer in MANETs. Key words: MANETs, Ad Hoc, Security, Robust, Malicious nodes, selfish node etc. I. INTRODUCTION TO MANETS The MANET is the collection of mobile users that communicate over relatively bandwidth constrained wireless links. Since the nodes are mobile, the network topology may change speedily and random over time. It is also known as infrastructure less network. MANETs can form stand-alone groups of wireless terminals, but some of these may be connected to some fixed network. Compared to wireless networks in infrastructure mode ad-hoc networking doesn't require any access points. This makes useful in lots of different applications. It is largely used in military applications and in rescue operations where the existing communication infrastructure has been destroyed is possible for two nodes which are not in the communication range of each other, but still can send and receive data from each other with the help of intermediate nodes which can act as routers. This functionality gives another name to ad hoc network as “multi-hop wireless network”. There are different routing attacks which appear in network layer during wireless transmission of messages. These attacks are caused by either some internal or external intruders. To accomplish our goal, we have done some methods to gathering information related to various types of attacks and solutions. In this paper we have study different attacks in network layer and also some security issue in mobile ad-hoc network. II. VULNERABILITY OF MANETS In a network Vulnerability of Manets is a weakness in security system. A particular system may be vulnerable to unauthorized data manipulation because the system does not verify a user’s identity before allowing data access. MANET is weaker than wired network. Some of the vulnerabilities are as follows: Lack of centralized management:A. MANET doesn’t have a centralized monitor server. The absence of centralized management makes the detection of attacks difficult because it is not east to monitor the traffic in a highly dynamic and large scale ad-hoc network. Lack of centralized management will impede trust management for nodes [1]. Dynamic Topology:B. In MANETs, nodes can join and leave the network dynamically and can move independently. Due to such type nature there is no fixed set of topology works in MANETs. The nodes with poor physical protection may become malicious node and reduce the network performance [2]. Resource availability:C. Resource availability is a major issue in MANET. Providing secure communication in such changing environment as well as protection against specific threats and attacks, leads to development of various security schemes and architectures. Collaborative ad-hoc environments also allow implementation of self-organized security mechanism [1]. Limited resources:D. The MANETs consists of different set of devices such as laptops, computers, mobile phones etc. All of such devices having different storage capacity, processing speed, computational power etc. This may attracts the attackers to focus on new attacks [2]. Scalability:E. Due to flexibility of nodes, scale of ad-hoc network changing all the time. So scalability is a major issue about security. Security mechanism should be capable of handling a large network as well as small ones [1]. Cooperativeness:F. Routing algorithm for MANETs usually assume that nodes are cooperative and not a malicious. As a result a malicious attacker can easily become an important routing agent and interrupt network operation by violating the protocol specifications [1]. Limited power supply:G. The nodes in mobile ad-hoc network need to consider restricted power supply, which will cause several problems. A node in mobile ad-hoc network may behave in a selfish manner when it is finding that there is only limited power supply [1]. Wireless Links:H. As the nodes in such networks are interconnected through wireless interface that makes it highly susceptible to link attacks. The bandwidths of wireless networks are less as compared to wired networks, which attracts many attackers to prevent normal communication among nodes [2].
  • 2. A Review Paper on Network Layer attacks in MANETs (IJSRD/Vol. 1/Issue 9/2013/0011) All rights reserved by www.ijsrd.com 1738 III. SECURITY ATTACKS Securing wireless ad-hoc networks is a highly challenging issue. Understanding possible form of attacks is always the first step towards developing good security solutions. Security of communication in MANET is important for secure transmission of information [9]. Absence of any central co-ordination mechanism and shared wireless medium makes MANET more vulnerable to digital/cyber- attacks than wired network there are a number of attacks that affect MANET. These attacks can be classified into two types. Types of Attack Characteristics Example Passive Attacks Obtains information without disturbing normal network operation • Difficult to detect Traffic analysis, traffic monitoring and eavesdropping Active Attacks Can be internal (attacker within the network) or external (attacker outside the network) •Can disturb network operation by modifying or deleting information, injecting a false message or impersonating a node Modification, Impersonation, jamming and message replay Table. 1: Attack Classification Passive attacksA. Passive attacks are the attack that does not disrupt proper operation of network .Attackers watch data exchanged in network without altering it. Detection of passive attacks is difficult since the operation of network itself does not get affected. Different type of passive attack as follow: 1) Release of Message Content Release of Message Content is like an Eavesdropping. Secretly listening to the private conversation of others without their consent 2) Traffic Analysis Traffic analysis is Monitoring or observes a situation for any changes which may occur over time. Active attacksB. Active attacks that are performed by the malicious nodes that bear some energy cost in order to perform the attacks. Active attacks include some modification of data stream or creation of false stream. Active attacks, whether carried out by an external advisory or an internal compromised node involves actions such as impersonation (masquerading or spoofing), modification, fabrication and replication. Different types of Active attacks are as follow: 1) Masquerade Masquerade is Pretend to be someone one is not. For example bob does not send a message to Alice. But Darth send a message to Alice as that appears by the bob. 2) Replay Reply is Pretend to Playing again. For Example Bob send a message to Alice but that message capture by Darth and latter reply message to Alice. 3) Modification of Messages Modification of messages is to Alteration in original message. Some Modification in message as like some data insertion, deletion, modification etc. Message is altered, deployed to produce an unauthorized effect. 4) Denial of Service Denial of service is an attempt to make a resource unavailable to its intended users. Some of the Dos Attacks are also listed below. IV. NETWORK LAYER ATTACKS Layer Example Of Attacks Network Layer DoS attacks: Wormhole, Black hole, Gray hole, Byzantine, Resource Consumption attack, Rushing attack Information Disclosure selfishness Attack: selfish node .malicious node Table. 2: Network Layer Attacks. Network Layer AttacksA. 1) Wormhole Attack: In this attack two compromised nodes create a tunnel or wormhole hole that linked through a private connection and thus they by-pass the network. This allows the node to short- circuit the normal flow of routing that control by the two attackers [5].The Wormhole attack is a kind of tunneling attack which is extremely dangerous and damaging to defend against even though the routing information is confidential, authenticated or encrypted [4]. It is relatively easy to deploy but exceedingly hard to detect. Usually Wormhole attack is launched by two malicious nodes (worms) connected via a high-speed wired or wireless link called Wormhole link or tunnel. Nodes outside each other’s communication range have to communicate via intermediate nodes in a multi-hop way. [4]. The worms can drop delivered messages and acquire statistical data of traffic by investigating message traffic [10]. To minimize delay, the attacker may forward each bit through the Wormhole link without waiting for the entire packet to be received [4].  Operation of Wormhole Attack: As shown in Figure 1, two malicious nodes X and Y created the Wormhole attack on the MANET. X and Y are connected via a high-speed Wormhole link that tunnels traffic between nodes A and B. when node A want to communicate with node B, normally it takes multiple hops for a packet to travel between them. Though in the attendance of worms X and Y, A and B start believing that they are immediate neighbors. Packets traveling through Wormhole link travel faster to the destination than packets traveling through multiple hops in the MANET. X and Y do not alter the packet header and falsify the route lengths. Packets received by X are replayed through Wormhole link to Y and vice versa. X and Y can now selectively drop data packets or analyze traffic and disrupt the network’s communication. Malicious nodes X and Y along with the Wormhole link are not visible in the route; and also the Wormhole attacker is hidden from the higher layers. Therefore, detection of Wormhole attack is exceedingly tough.
  • 3. A Review Paper on Network Layer attacks in MANETs (IJSRD/Vol. 1/Issue 9/2013/0011) All rights reserved by www.ijsrd.com 1739 Fig. 1: wormhole Attack 2) Packet Dropping or Black-hole Attack: Blackhole attack is another type of DoS attack. In mobile ad hoc networks (MANETs), nodes usually cooperate and forward each other’s packets in order to enable out of range communication. Saving their own resources or for intentionally disrupting regular communications. This type of misbehavior is generally referred to as packet dropping attack or black hole attack [6].That generates and disseminates fabricated routing information. If the malicious node replies to the requesting node before the actual node replies, a bogus route will be created. Therefore packets are not forwarded to the specified destination node; instead, the malicious node intercepts the packets, drops them and thus, absorbs network traffic [4].  Operation of Blackhole Attack: An example of Blackhole attack against AODV protocol (Ad-hoc On demand Distance Vector) is shown in Figure 2. [4]. Suppose source S wants to communicate with node D. S initiates route discovery process by broadcasting route request packets (RREQ) to its neighbors. The destination node D or any intermediate nodes having fresh route to the destination can give reply by sending reply packet (RREP) to S. Considering no intermediate nodes have a fresh route to D, they forward request packets towards destination. As X is a malicious node, it doesn’t forward the request packet ahead; instead, it falsely replies to S indicating that it has a valid fresh route to D. Thus, reply packet from X reaches to S ahead of reply packets from other neighbors of S. Therefore, S considers sending packets to D via X considering that X has a shortest route to D. Now X absorbs all packets forwarded from S to D. This is how a Blackhole attack is setup. Fig. 2: Blackhole attack 3) Gray-hole attack: This attack is also known as routing misbehaviour attack which leads to dropping of messages. Gray hole attack has two phases. In the first phase the node advertise itself as having a valid route to destination while in second phase, nodes drops intercepted packets with a certain probability[1].Grayhole attack is an extension of Blackhole attack in which a malicious node’s behavior is exceptionally unpredictable[4]. 4) Resource Consumption Attack: In this attack, a malicious node intentionally tries to consume the resources (e.g. battery power, bandwidth etc) of other nodes in the network. The attack can be of various types like unnecessary route requests, route discovery, control messages, or by sending stale information [6]. 5) Selfishness Attack: Cooperation among nodes in Ad- Hoc Networks is an important issue for communication. But some nodes do not cooperate in communication and saves their energy. These nodes are called Selfish nodes. Selfish nodes participate in route discovery stage properly to update their routing table, but as soon as data forwarding stage begins, they drop data packets This malicious node which is not participating in network operations, use the network for its advantage to save its own resources such as power [6, 1]. a) Selfish Misbehavior of Nodes Attacks under this category, are directly affects the self- performance of nodes and does not interfere with the operation of the network [2]. It may include two important factors. i) Protection of battery power ii) Gaining partial share of bandwidth: The selfish nodes may reject to take part in the forwarding process or drops the packets purposefully in order to conserve the resources. These attacks use the routing protocol to their own advantage. Packet dropping is one of the main attacks by selfish node which indications to congestion in network. However most of routing protocols have no mechanism to detect whether the packets being forwarded or not except DSR (dynamic source routing) [2]. b) Behavior of Malicious nodes The main of malicious node is to disrupt normal operation of routing protocol. The impact of such attack is increased when the communication takes place between neighboring nodes. Attacks of such type are fall into following categories. i) Denial of Service (DOS): These types of attacks produced a malicious action with the help of compromised nodes that forms severe security risks. In the presence of compromised nodes, it is very difficult to detect the compromised routing. The compromised route appears like a normal route but leads to severe problems. For example, a compromised node could participate in the communication but drops some packets which lead to degradation in the quality of service being offered by network [2]. ii) Attacks on Network integrity: Network integrity is an important issue, in order to provide secure communication and quality of service in network. There are so many threats which exploit the routing protocol to introduce wrong routing information [2]. iii) Misdirecting traffic: A malicious node advertises wrong routing information in order to get secure data before the
  • 4. A Review Paper on Network Layer attacks in MANETs (IJSRD/Vol. 1/Issue 9/2013/0011) All rights reserved by www.ijsrd.com 1740 actual route. These nodes receive information that was intended for owner of the address. A malicious node may advertise fake route request, so that other nodes will then direct route replies to the node [2]. iv) Attacking neighbor sensing protocols: malicious nodes advertise fake error messages so that important links interface are marked as broken. This will result in decrease in network throughput and quality of service [2].  Operation of malicious nodes In such attacks, the attackers can create routing loops to form severe congestion. Different type of attacks are identified which are initiated by malicious node. The malicious node “X” can absorb important data by placing itself between source “A” and destination “D” as shown in Figure-3. “X” can also divert the data packets exchanged between “A” and “D”, which results in significant end to end delay between “A” and “D”. In this type of attacks attackers attacks against Routing and Path Selection The malicious node can disrupt the route discovery process by creating routing loops and overflow routing tables [2]. Fig. 3: Malicious nodes V. CONCLUSION AND FUTURE WORK Due to dynamic structure of MANETs and having no centralized administration, it makes it more vulnerable to many attacks. It is discussed, the weakness MANETs as well as various active and passive attacks. (There is no significant contribution has been shown in work means what is your finding and what are the solutions) In future study we will try to invent such intrusion detection system with routing protocols that helps to reduce the impact of different attacks. REFERENCES [1] A Literature Review of Security Attack in Mobile Ad- hoc Networks Priyank Goyal, Bhiwani, Haryana, Sahil Batra ,International journal of computer application (0975-8887) volume-9 No 12,November 2010. [2] Analysis of Different Security Attacks in MANETs on Protocol Stack A Review Gagandeep, Aashima, Pawan Kumar, International Journal o Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-1, Issue-5, June 2012. [3] Review Report ATTACK Analysis in Mobile Ad HOC Network Based on System Observations Nidhi Saxena1, Iyagpal Yadav, Vipul Saxena International Journal of Advanced Research in Computer Science a Software Engineering 3(7), July – 2013, pp. 618-623. [4] DoS Attacks in Mobile Ad-hoc Networks: A Survey”, Rutvij H. Jhaveri, Sankita J. Patel and Devesh C. Jinwala,” 2012 Second International Conference on Advanced Computing & Communication Technologies, IEEE. [5] Detecting unauthorized and compromised node in mobile ad-hoc network, Nikoskomniuos. [6] Selfish Node Detection with modified AODV in Ad- Hoc Networks Niyati Shah , Sharada Valiveti , Dr. K Kotecha Institute of Technology Nirma University Ahmedabad, Gujarat, India. [7] Advanced Detection of Selfish or Malicious Nodes in Ad hoc Networks Frank Kargl, Andreas Klenk, Stefan Schlott, and Michael Weber. [8] P. D. PrzemyslawKazienko, “Intrusion detection systems (ids) part i - (network intrusions; attack symptoms; ids tasks; and ids architecture),” Apr, 2003. [9] Z. Karakehayov, “Using REWARD to Detect Team Black- Hole Attacks in Wireless Sensor Networks,” Wksp. Real-World Wireless Sensor Networks, June 20– 21, 2005. [10]MahdiTaheri, Dr. majidnaderi, Mohammad Bagher Barekatain, “New Approach for Detection and defending the Wormhole Attacks in Wireless Ad Hoc Networks”, 18th Iranian Conference on Electrical Engineering,, May 2010, pp. 331-335.